Kenna Security is now part of Cisco

|Learn more

Kenna Blog

Thoughtful perspectives on Modern Vulnerability Management.

Power Couple: Kenna’s Vulnerability Intel + ServiceNow Vulnerability Response

Every once in a while, two things come together and create something new. Abbott and Costello. Johnny and June. Fred and Ginger. The whole becomes greater than the sum of its parts.
Read More
Sign up to get the latest updates
Cybersecurity Best Practices

Logins in a Dangerous Time: How Organizations Are Navigating Cyberwarfare

We’ve gathered three key findings from Duo’s Trusted Access Report to help security leaders make future-defining decisions.
Cybersecurity Best Practices

Want Less Cyber Stress This Holiday Season? Do These 4 Things.

For a less stressful holiday season, here are four critical musts to have in place, especially when you're OOO.  
Threat Intelligence

Level Up Risk Visibility with New Kenna.VI+ Updates

Kenna.VM Premier—the most robust tier of our risk-based vulnerability management platform—is live today! Here's what it can do for you.
Data Science

What Is EPSS and Why Does It Matter?

The Exploit Prediction Scoring System (EPSS) is becoming increasingly popular. Let's unpack some frequently asked questions.
Trending Vulns

November Vuln of the Month: CVE-2022-32893

November’s Vuln of the Month spotlights an Apple platform vulnerability—one that may pose risks to organizations with out-of-date iOS and MacOS versions.

How to Future-Proof Your Assets With This CIO’s Approach to Tough Projects

The former CIO for the City of Tuscon shares practical tips that make preparing for a daunting future seem much more manageable.

5 Things Every CIO Should Know About VM

Read this eBook to learn what a modern vulnerability management approach means to your IT operation. You discover how it helps CIOs like you create more efficient and effective teams while reducing your company’s overall risk profile.

Download Now

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.